Question: Match each description with the appropriate term. - A. B. C. D. E. F. G. H. I. J. Automatically generated constantly by the system when

Match each description with the appropriate term.

- A. B. C. D. E. F. G. H. I. J.

Automatically generated constantly by the system when user enters a PIN.

- A. B. C. D. E. F. G. H. I. J.

Logs that record activity at the system, application and use level.

- A. B. C. D. E. F. G. H. I. J.

Involves recording users keystrokes and the systems response.

- A. B. C. D. E. F. G. H. I. J.

Summarizes key activities related to system resources.

- A. B. C. D. E. F. G. H. I. J.

Interception of user IDs, passwords, confidential e-mails, and financial data files.

- A. B. C. D. E. F. G. H. I. J.

Masquerading to gain access to a Web server and/or to perpetrate an unlawful act without revealing ones identity.

- A. B. C. D. E. F. G. H. I. J.

An assault on a Web server to prevent it from servicing users.

- A. B. C. D. E. F. G. H. I. J.

DOS attacker that uses numerous intermediary computers to flood the target computer with test messages, pings causing network congestion.

- A. B. C. D. E. F. G. H. I. J.

Prevent unauthorized access to or from a private network.

- A. B. C. D. E. F. G. H. I. J.

Electronic authentication where the Sender uses a one-way hashing algorithm to calculate a digest of the text message which is encrypted.

A.

Firewalls

B.

Digital Signature

C.

Keystroke Monitoring

D.

Denial of Service (DOS) Attack

E.

IP Spoofing

F.

Smurf

G.

One-time Passwords

H.

Event Monitoring

I.

System Audit Trails

J.

Sniffing

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!